Over the past couple weeks I have been working on a simple server to serve Wii U exploits from a fairly lightweight program. This is the current result, please tell me if you find a problem with it! Please keep in mind that this only supports userland code execution inside the context of the Wii U web browser! Supported versions: US 5.5.1 US 5.5.0 US 5.4.0 US 5.3.2 EU 5.5.1 EU 5.5.0 EU 5.4.0 EU 5.3.2 JP 5.5.1 JP 5.4.0 JP 5.3.2 Used exploits: stageFright, thanks Yellows8! (5.3.2, 5.4.0, 5.5.0, 5.5.1) To run this execute "java -jar haxServer.jar" from the command line, in order for it to work you will need to provide the code and loaders for the server to serve; in payloads and loaders respectively. If you need to serve a normal file put it inside data. Then browse to "http://[pc ip]/[anything legal string]?codeName" to serve the correct payload for the Wii U's detected browser with "codeName.bin" as the payload that the loader will use. Loaders: Stagefright In order to use the stagefright vuln you will need to compile the loader from here and name it "stagefright.bin" and place it in the loaders directory. Keep in mind, this is beta; expect bugs and please report any you find, please no "it no work, you dumb" type posts. Logs or I can not help. You will need java 8+ to run this. Download, last updated on 5/4/2016 I recommend using this, makes development easier.